Defending against next-generation threats requires a strategy that moves beyond signatures and behavioral heuristics. Signatures and heuristics remain valuable against known threats: criminals never throw away an exploit toolkit or other penetration technique, they just add new capabilities and concoct new evasion tactics. But against unknown threats, traditional defenses like firewalls, IPS, antivirus and Web gateways collapse, leaving a wide-open hole for cybercriminals. Today’s attacks look new and unknown to signature-based tools because the attacks employ advanced malware and zero-day vulnerabilities. These attacks do not trigger heuristics because of techniques like camouflage, multi-stage packaging, targeting and other advanced persistent threat (APT) tactics.
White Paper Download
CISO guide to next generation threats
Combating advanced malware, zero-day and targeted APT attacks
Date: 14 June 2011, 15:50
You must have an account to access this white paper. Please register below. If you already have an account, please login.